• Title/Summary/Keyword: existing network

Search Result 5,650, Processing Time 0.038 seconds

Handover Control for WCDMA Femtocell Networks

  • Chowdhury, Mostafa Zaman;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.741-752
    • /
    • 2010
  • The ability to seamlessly switch between the macro networks and femtocell networks is a key driver for femtocell network deployment. The handover procedures for the integrated femtocell/macrocell networks differ from the existing handovers. Some modifications of existing network and protocol architecture for the integration of femtocell networks with the existing macrocell networks are also essential. These modifications change the signal flow for handover procedures due to different 2-tier cell (macrocell and femtocell) environment. The handover between two networks should be performed with minimum signaling. A frequent and unnecessary handover is another problem for hierarchical femtocell/macrocell network environment that must be minimized. This work studies the details mobility management schemes for small and medium scale femtocell network deployment. To do that, firstly we present two different network architectures for small scale and medium scale WCDMA femtocell deployment. The details handover call flow for these two network architectures and CAC scheme to minimize the unnecessary handovers are proposed for the integrated femtocell/macrocell networks. The numerical analysis for the proposed M/M/N/N queuing scheme and the simulation results of the proposed CAC scheme demonstrate the handover call control performances for femtocell environment.

Enhanced Hybrid Routing Protocol for Load Balancing in WSN Using Mobile Sink Node

  • Kaur, Rajwinder;Shergi, Gurleen Kaur
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.3
    • /
    • pp.268-277
    • /
    • 2016
  • Load balancing is a significant technique to prolong a network's lifetime in sensor network. This paper introduces a hybrid approach named as Load Distributing Hybrid Routing Protocol (LDHRP) composed with a border node routing protocol (BDRP) and greedy forwarding (GF) strategy which will make the routing effective, especially in mobility scenarios. In an existing solution, because of the high network complexity, the data delivery latency increases. To overcome this limitation, a new approach is proposed in which the source node transmits the data to its respective destination via border nodes or greedily until the complete data is transmitted. In this way, the whole load of a network is evenly distributed among the participating nodes. However, border node is mainly responsible in aggregating data from the source and further forwards it to mobile sink; so there will be fewer chances of energy expenditure in the network. In addition to this, number of hop counts while transmitting the data will be reduced as compared to the existing solutions HRLBP and ZRP. From the simulation results, we conclude that proposed approach outperforms well than existing solutions in terms including end-to-end delay, packet loss rate and so on and thus guarantees enhancement in lifetime.

Study on Tag, Trust and Probability Matrix Factorization Based Social Network Recommendation

  • Liu, Zhigang;Zhong, Haidong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2082-2102
    • /
    • 2018
  • In recent years, social network related applications such as WeChat, Facebook, Twitter and so on, have attracted hundreds of millions of people to share their experience, plan or organize, and attend social events with friends. In these operations, plenty of valuable information is accumulated, which makes an innovative approach to explore users' preference and overcome challenges in traditional recommender systems. Based on the study of the existing social network recommendation methods, we find there is an abundant information that can be incorporated into probability matrix factorization (PMF) model to handle challenges such as data sparsity in many recommender systems. Therefore, the research put forward a unified social network recommendation framework that combine tags, trust between users, ratings with PMF. The uniformed method is based on three existing recommendation models (SoRecUser, SoRecItem and SoRec), and the complexity analysis indicates that our approach has good effectiveness and can be applied to large-scale datasets. Furthermore, experimental results on publicly available Last.fm dataset show that our method outperforms the existing state-of-art social network recommendation approaches, measured by MAE and MRSE in different data sparse conditions.

The Mediating Role of Network Service for Customer Satisfaction during COVID-19 Online Classes: Evidence from University Students

  • Naveed Akhtar Qureshi;Raheela Haque
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.176-180
    • /
    • 2023
  • Aim of this study to examine the mediating role of network service between perceived quality, retailer service and customer satisfaction during COVID-19. Primary data gathered through adopted questionnaire from previous studies and 200 university students were asked to fill online questionnaire during COVID-19 situation in country. Structural Equation Modelling technique applied in order to test the proposed hypothesis generated from existing literature review. Findings revealed full mediation effect of network service for both perceived quality and retailer service on customer satisfaction during COVID-19. New insights of this study are key role of network services is identified and university students' satisfaction is measured for online classes in developing country, Pakistan. In future serial mediation is suggested for validity of existing results in developed and developing countries.

Economic Efficiency of Using Existing Pipe Line in Hydrogen Network (수소 네트워크 구성 시 기존 파이프 라인 활용의 경제적 효과)

  • Kim, Daehyeon;Jeong, Changhyun;Han, Chonghun
    • Korean Chemical Engineering Research
    • /
    • v.46 no.3
    • /
    • pp.598-603
    • /
    • 2008
  • In petrochemical complex, Hydrogen Network optimization is surveying the extra Hydrogen and needed Hydrogen of each company and calculating the optimized distribution. This paper compares the case of using the existing pipeline and the case of not using the existing pipeline to show the effect quantitatively and clearly by modeling the both cases and using mathematical programming. As a result, using the existing pipeline can save the pipe cost over 20% and increase the whole network benefit by thirteen billion won.

Optimal synthesis for retrofitting heat exchanger network

  • Lee, In-Beum;Jung, Jae-Hak;Chang, Kun-Soo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10b
    • /
    • pp.1259-1264
    • /
    • 1990
  • During the past two decades, a lot of researches have been done on the synthesis of grassroot heat exchanger networks(HEN). However, few have been dedicated to retrofit of existing heat exchanger networks, which usually use more amount of utilities (i.e. steam and/or cooling water) than the minimum requirements. This excess gives motivation of trades-off between energy saving and rearranging investment. In this paper, an algorithmic-evolutionary synthesis procedure for retrofitting heat exchanger networks is proposed. It consists of two stages. First, after the amount of maximum energy recovery(MER) is computed, a grass-root network featuring minimum number of units(MNU) is synthesized. In this stage, a systematic procedure of synthesizing MNU networks is presented. It is based upon the concept of pinch, from which networks are synthesized in a logical way by the heuristics verified by the pinch technology. In the second stage, since an initial feasible network is synthesized based on the pre-analysis result of MER and must-matches, an assignment problem between new and existing units is solved to minimize total required additional areas. After the existing units are assigned, the network can be improved by switching some units. For this purpose, an improvement problem is formulated and solved to utilize the areas of existing units as much as possible. An example is used to demonstrate the effectiveness of the proposed method.

  • PDF

Networks and Protocols for MPEG-21 Digital Item Transmission (MPEG-21 디지털 아이템 전송을 위한 네트워크 구조 및 프로토콜)

  • 송영주;김만배;홍진우
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.427-436
    • /
    • 2003
  • Many applications that are transport multimedia data through the networks should put existing network structure to practical use. Because the existing network structure and protocols are designed for static data transmission, multimedia applications with timing concept have limitations for using existence. In this paper, we present limitations of existing network structure for multimedia delivery, survey network element's characteristics in side view of multimedia application, present the streaming protocol for realtime multimedia traffic. Lastly, we consider a protocol stack for MPEG-21 Digital Item transmission using these existing protocols.

Whale Optimization Algorithm and Blockchain Technology for Intelligent Networks

  • Sulthana, Shazia;Reddy, BN Manjunatha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.157-164
    • /
    • 2022
  • The proposed privacy preserving scheme has identified the drawbacks of existing schemes in Vehicular Networks. This prototype enhances the number of nodes by decreasing the cluster size. This algorithm is integrated with the whale optimization algorithm and Block Chain Technology. A set of results are done through the NS-2 simulator in the direction to check the effectiveness of proposed algorithm. The proposed method shows better results than with the existing techniques in terms of Delay, Drop, Delivery ratio, Overhead, throughout under the denial of attack.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

A Mechanism to Support Scalability for Network Mobility (확장성 있는 네트워크 이동성 지원 방안)

  • Kim Taeeun;Lee Meejeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.34-50
    • /
    • 2005
  • Recently, various proposals for supporting network mobility, which provides efficient Internet access when a network formed within a vehicle moves around as a unit, have emerged. The schemes in those proposals, though, manifest some major drawbacks with respect to scalability: If the number of mobile nodes within a mobile network is large, the handoff latency would increase greatly, causing communication disruption; Data delivery to a node within a nested mobile network nay suffer extremely inefficient pinball routing. We propose a scalable network mobility supporting mechanism named SNEMOS (Scalable NEtwork Mobility Support), which resolves the above two major problems of the existing schemes. The performance of SNEMOS is compared with the existing schemes through extensive simulations. The numerical results show that SNEMOS outperforms the existing schemes with respect to handoff latency hop counts of routing paths, packet delivery time, header overhead in data packets, and signaling overhead.